Botnet of Smart Power-Consuming Appliances May Cause Widespread Power Outages. Digital technology has revolutionized the way we use appliances and perform day-to-day...
Think twice before sharing your fax number with someone. Many corporations provide their fax number in the contact information page on the...
At the largest hacking conference in the world, Defcon 2018, there have been many surprising discoveries. However, the news that has shocked...
Staying connected when managing or owning a fleet is crucial. It is the only way to have real-time data and the monitoring...
Security cameras and other IoT devices have been frequently identified to be incompetent and plagued with a variety of built-in flaws that...
Cybersecurity researchers have detected a couple of vulnerabilities in an IoT vacuum cleaner lineup that could let hackers spy on the victims,...
Armis, an Internet of Things (IoT) security vendor and cyber-security firm, reports that about half a billion smart devices being used around...
The aviation industry is growing, thanks to millions of passengers traveling around the world. According to Statista, in 2017, 36.8 million flights were operated...
2018 begins with the rise of the Internet of Things (” IoT “) which is based on the existence of an interconnection...
Polar Flow, an app developed by Polar, a Finland based sports gadgets manufacture has been found exposing personal and sensitive details of millions...
It is Extremely challenging task to identify and successfully deploy an absolutely innovative and never-seen-before defense solution for Industrial Control System (ICS)....
For any organization looking to make a successful digital transformation, cybersecurity must be a top priority—hard stop. Damages and data loss related...
For the last few years, hacking a traffic sign or an electronic billboard has become a trend. Some hack it for fun...
According to a newly released report, a malicious crypto-mining and traffic monetization malware campaign is underway. The report, which was published on...
With things changing rampantly in the world of cybercrime, things are evolving fast for cybersecurity as well. Cyber-criminals are evolving into being...
As recently as May 17th, 2018, a security camera recorded a pair of thieves walking around a car and one of them...
Z-Wave, a Wireless Communication Protocol that widely used in IoT Smart Devices vulnerability allow attackers to perform Downgrade Attack and compromise nearly...
Abbott has recalled around 350,000 implantable defibrillators for firmware upgrading because these devices are identified to be containing life-threatening flaws and vulnerable...
Modern-day vehicles have become overly digitized for the sake of offering advanced technicality to drivers. However, being digital cannot ensure optimal security...
With the onslaught of Internet of Things devices, ensuring its security has become a major concern among the makers. In a bid to...
In Southeast China, the police used facial recognition tech to locate and detain a suspect from among a crowd of over 60,000...